The present application relates to value transfer cards and, more particularly, to servers and methods for value transfer card replacement.
When a physical value transfer card is reported lost or stolen, the physical value transfer card is cancelled. When the physical value transfer card is cancelled, the owner or user of the physical value transfer card may be left without means for payment.
Embodiments are described in detail below, with reference to the following drawings:
Like reference numerals are used in the drawings to denote like elements and features.
Accordingly, in one aspect there is provided a server comprising a communications module; a processor coupled to the communications module; and a memory coupled to the processor, the memory storing processor-executable instructions which, when executed by the processor, configure the processor to receive, via the communications module and from a client device, an indication that a physical value transfer card has been compromised; in response to receiving the indication that the physical value transfer card has been compromised, provide, via the communications module and to the client device, a selectable option to add a digital value transfer card to a mobile wallet application associated with the client device; receive, via the communications module and from the client device, an indication of a selection of the selectable option to add the digital value transfer card to the mobile wallet application associated with the client device; and provision the mobile wallet application associated with the client device with the digital value transfer card.
In one or more embodiments, the processor-executable instructions, when executed by the processor, further configure the processor to detect an indication of fraud associated with the physical value transfer card; and send, via the communications module and to the client device, a notification of possible fraud; wherein the indication that the physical value transfer card has been compromised is received in response to the notification of the possible fraud.
In one or more embodiments, the indication of fraud is detected based at least on electronic data of one or more payments made using the physical value transfer card.
In one or more embodiments, the electronic data includes at least one of a location of a payment, an amount of the payment and a frequency of the payment.
In one or more embodiments, the processor-executable instructions, when executed by the processor, further configure the processor to obtain, via the communications module and from the client device, location data representing a location of the client device; identify, from a database, an electronic address associated with a nearest branch to the client device; and send, via the communications module and to the electronic address, an electronic message configuring a printer to automatically generate a replacement physical value transfer card.
In one or more embodiments, the printer is an embosser.
In one or more embodiments, the processor-executable instructions, when executed by the processor, further configure the processor to send, via the communications module and to the client device, an indication that the replacement physical value transfer card is available for pick up.
In one or more embodiments, the processor-executable instructions, when executed by the processor, further configure the processor to send, via the communications module and to the client device, instructions for picking up the replacement physical value transfer card.
In one or more embodiments, the indication that the physical value transfer card has been compromised includes an indication that the physical value transfer card has been lost or stolen.
In one or more embodiments, the indication that the physical value transfer card has been compromised is received, via the communications module and from the client device, in response to user selection of a lock card function.
In another aspect there is provided a method comprising receiving, via a communications module and from a client device, an indication that a physical value transfer card has been compromised; in response to receiving the indication that the physical value transfer card has been compromised, providing, via the communications module and to the client device, a selectable option to add a digital value transfer card to a mobile wallet application associated with the client device; receiving, via the communications module and from the client device, an indication of a selection of the selectable option to add the digital value transfer card to the mobile wallet application associated with the client device; and provisioning the mobile wallet application associated with the client device with the digital value transfer card.
In one or more embodiments, the method further comprises detecting an indication of fraud associated with the physical value transfer card; and sending, via the communications module and to the client device, a notification of possible fraud; wherein the indication that the physical value transfer card has been compromised is received in response to the notification of the possible fraud.
In one or more embodiments, the indication of fraud is detected based at least on electronic data of one or more payments made using the physical value transfer card.
In one or more embodiments, the electronic data includes at least one of a location of a payment, an amount of the payment and a frequency of the payment.
In one or more embodiments, the method further comprises obtaining, via the communications module and from the client device, location data representing a location of the client device; identifying, from a database, an electronic address associated with a nearest branch to the client device; and sending, via the communications module and to the electronic address, an electronic message configuring a printer to automatically generate a replacement physical value transfer card.
In one or more embodiments, the method further comprises sending, via the communications module and to the client device, an indication that the replacement physical value transfer card is available for pick up.
In one or more embodiments, the method further comprises sending, via the communications module and to the client device, instructions for picking up the replacement physical value transfer card.
In one or more embodiments, the indication that the physical value transfer card has been compromised includes an indication that the physical value transfer card has been lost or stolen.
In one or more embodiments, the indication that the physical value transfer card has been compromised is received, via the communications module and from the client device, in response to user selection of a lock card function.
In another aspect there is provided a non-transitory computer readable storage medium comprising computer-executable instructions which, when executed, configure a computing device to receive, via a communications module and from a client device, an indication that a physical value transfer card has been compromised; in response to receiving the indication that the physical value transfer card has been compromised, provide, via the communications module and to the client device, a selectable option to add a digital value transfer card to a mobile wallet application associated with the client device; receive, via the communications module and from the client device, an indication of a selection of the selectable option to add the digital value transfer card to the mobile wallet application associated with the client device; and provision the mobile wallet application associated with the client device with the digital value transfer card.
Systems and methods for value transfer card replacement are described herein.
Other aspects and features of the present application will be understood by those of ordinary skill in the art from a review of the following description of examples in conjunction with the accompanying figures.
In the present application, the term “and/or” is intended to cover all possible combinations and sub-combinations of the listed elements, including any one of the listed elements alone, any sub-combination, or all of the elements, and without necessarily excluding additional elements.
In the present application, the phrase “at least one of . . . and . . . ” is intended to cover any one or more of the listed elements, including any one of the listed elements alone, any sub-combination, or all of the elements, without necessarily excluding any additional elements, and without necessarily requiring all of the elements.
In the following, value transfer cards are described. Value transfer cards may be credit cards or debit cards. Value transfer cards may be physical value transfer cards or digital value transfer cards. Physical value transfer cards may be an ISO/IEC 7810 format card. Digital value transfer cards may be stored in a mobile wallet associated with a client device.
As illustrated, a client device 100 and a server 110 communicate via a network 120. A printer 130 may also communicate with the client device 100 and the server 110 over the network 120.
The client device 100, the server 110 and the printer 130 may be in geographically disparate locations. Put differently, the client device 100, the server 110 and the printer 130 may be located remote from one another.
The client device 100 and the server 110 are computer systems. The client device 100 may take a variety of forms including, for example, a mobile communication device such as a smartphone, a tablet computer, a wearable computer such as a head-mounted display or smartwatch, a laptop or desktop computer, or a computing device of another type.
The printer 130 may be located within a branch of a bank and may comprise an internal computer system (not shown) that is configured to communicate with the client device 100 and/or server 110 over the network 120. The printer 130 may include an embossing function configured to emboss a value transfer card. The printer 130 may additionally or alternatively include a printing function configured to print on a value transfer card.
The client device 100 is adapted to present a graphical user interface that allows for communication with the server 110. For example, the client device 100 may be adapted to prompt a user to respond to queries communicated from the server 110. The client device 100 may be adapted to submit a request for a replacement value transfer card through a chat interface and/or mobile application that may be provided on the client device 100. The client device 100 may be adapted to receive and/or store a digital value transfer card associated with an account stored on the server 110.
As will be described in more detail below, the server 110 is adapted to generate and provide a digital value transfer card associated with an account to the client device 100 in response to receiving an indication that a physical value transfer card has been compromised, lost or stolen. The server 110 may receive location data indicating a location of the client device 100, may determine a nearest branch to the client device 100, and may automatically communicate with a printer located at the nearest branch to automatically generate a replacement physical value transfer card. Operations associated with the server 110 will be described in greater detail below.
The network 120 is a computer network. In some embodiments, the network 120 may be an internetwork such as may be formed of one or more interconnected computer networks. For example, the network 120 may be or may include an Ethernet network, an asynchronous transfer mode (ATM) network, a wireless network, a telecommunications network or the like.
As further explained below, the client device 100 communicates with the server 110 via the network 120 to generate a replacement physical value transfer card and/or to obtain a digital value transfer card in the event that a physical value transfer card is compromised, lost or stolen. In at least some embodiments, the server 110 and the printer 130 may automatically generate a replacement digital value transfer card based on a location of the client device 100 without any human intervention.
The client device 100 may include modules including, as illustrated, for example, one or more displays 210, an image capture module 220, a sensor module 230, and a computing device 240.
The one or more displays 210 are a display module. The one or more displays 210 are used to display screens of a graphical user interface that may be used, for example, to indicate that a value transfer card has been compromised (
The image capture module 220 may be or may include a camera. The image capture module 220 may be used to obtain image data, such as images. The image capture module 220 may be or may include a digital image sensor system as, for example, a charge coupled device (CCD) or a complementary metal-oxide-semiconductor (CMOS) image sensor.
The sensor module 230 may be a sensor that generates sensor data based on a sensed condition. By way of example, the sensor module 230 may be or include a location subsystem which generates location data indicating a location of the client device 100. The location may be the current geographic location of the client device 100. The location subsystem may be or include any one or more of a global positioning system (GPS), an inertial navigation system (INS), a wireless (e.g., cellular) triangulation system, a beacon-based location system (such as a Bluetooth low energy beacon system), or a location subsystem of another type.
The computing device 240 is in communication with the one or more displays 210, the image capture module 220, and the sensor module 230. The computing device 240 may be or may include a processor which is coupled to the one or more displays 210, the image capture module 220, and/or the sensor module 230.
The example computing device 300 includes a variety of modules. For example, as illustrated, the example computing device 300 may include a processor 310, a memory 320, a communications module 330, and/or a storage module 340. As illustrated, the foregoing example modules of the example computing device 300 are in communication over a bus 350.
The processor 310 is a hardware processor. The processor 310 may, for example, be one or more ARM, Intel x86, PowerPC processors or the like.
The memory 320 allows data to be stored and retrieved. The memory 320 may include, for example, random access memory, read-only memory, and persistent storage. Persistent storage may be, for example, flash memory, a solid-state drive or the like. Read-only memory and persistent storage are a non-transitory computer-readable storage medium. A computer-readable medium may be organized using a file system such as may be administered by an operating system governing overall operation of the example computing device 300.
The communications module 330 allows the example computing device 300 to communicate with other computing devices and/or various communications networks. For example, the communications module 330 may allow the example computing device 300 to send or receive communications signals. Communications signals may be sent or received according to one or more protocols or according to one or more standards. For example, the communications module 330 may allow the example computing device 300 to communicate via a cellular data network, such as for example, according to one or more standards such as, for example, Global System for Mobile Communications (GSM), Code Division Multiple Access (CDMA), Evolution Data Optimized (EVDO), Long-term Evolution (LTE) or the like. Additionally or alternatively, the communications module 330 may allow the example computing device 300 to communicate using near-field communication (NFC), via Wi-Fi™, using Bluetooth™ or via some combination of one or more networks or protocols. In some embodiments, all or a portion of the communications module 330 may be integrated into a component of the example computing device 300. For example, the communications module may be integrated into a communications chipset. In some embodiments, the communications module 330 may be omitted such as, for example, if sending and receiving communications is not required in a particular application.
The storage module 340 allows the example computing device 300 to store and retrieve data. In some embodiments, the storage module 340 may be formed as a part of the memory 320 and/or may be used to access all or a portion of the memory 320. Additionally or alternatively, the storage module 340 may be used to store and retrieve data from persisted storage other than the persisted storage (if any) accessible via the memory 320. In some embodiments, the storage module 340 may be used to store and retrieve data in a database. A database may be stored in persisted storage. Additionally or alternatively, the storage module 340 may access data stored remotely such as, for example, as may be accessed using a local area network (LAN), wide area network (WAN), personal area network (PAN), and/or a storage area network (SAN). In some embodiments, the storage module 340 may access data stored remotely using the communications module 330. In some embodiments, the storage module 340 may be omitted and its function may be performed by the memory 320 and/or by the processor 310 in concert with the communications module 330 such as, for example, if data is stored remotely. The storage module may also be referred to as a data store.
Software comprising instructions is executed by the processor 310 from a computer-readable medium. For example, software may be loaded into random-access memory from persistent storage of the memory 320. Additionally or alternatively, instructions may be executed by the processor 310 directly from read-only memory of the memory 320.
The operating system 400 is software. The operating system 400 allows the application 410 to access the processor 310 (
The application 410 adapts the example computing device 300, in combination with the operating system 400, to operate as a device performing a particular function. For example, the application 410 may cooperate with the operating system 400 to adapt a suitable embodiment of the example computing device 300 to operate as the computing device 240 (
Where the application 410 is provided on the client device 100, the application may be a mobile banking application associated with an account. The application 410 may be a web-based or standalone application. The application 410 may be configured to engage in an authenticated session with the server 110. The authenticated session may occur, for example, after the client device 100 has validly authenticated itself to the server 110 using, for example, one or more credentials. During the authenticated session, the client device 100 may engage in encrypted communications with the server 110. For example, as will be described in detail below, the client device 100 may send location data to the server 110 and the server 110 may analyze the location data to determine a nearest branch to the client device 100. The application may additionally or alternatively be a mobile wallet application that is stored in memory on the client device 100 and includes value transfer card information. The mobile wallet application may utilize an NFC module of the client device 100 to make in-store payments and may additionally be used to make online payments.
Where the application 410 is provided on the server 110, the application 410 may include a plurality of software modules associated with mobile banking. For example, a credit module may include computer-executable instructions for determining an amount of credit available to a particular account, a fraud detection module may include computer-executable instructions for identifying potential fraudulent activity on a particular account, a value transfer card management module may include computer-executable instructions for cancelling or locking a value transfer card based on output from the fraud detection module, a value transfer card replacement module may include computer-executable instructions for determining a nearest branch location based on location data received from the client device 100 and for communicating electronic data to the printer 130 at the nearest branch location to generate a replacement physical value transfer card.
Where the application 410 is provided as part of the internal computing system of the printer 130, the application 410 may include one or more modules associated with printing or embossing a credit card. For example, a printing module may include computer-executable instructions for printing or embossing a value transfer card number on a blank or new value transfer card based on electronic data received from the server 110.
At least some components illustrated in
Operations performed by the client device 100, the server 110 and the printer 130 will now be described.
Method 500 begins when the server 110 receives, via the communications module and from the client device 100, an indication that a physical value transfer card has been compromised (step 510). In this embodiment, the indication is received in response to a user reporting the physical value transfer card is lost or stolen through a mobile application stored on the client device 100. An example is shown in
Once the server 110 receives the indication that the physical value transfer card is lost or stolen, the physical value transfer card is cancelled (step 520). In this embodiment, the server 110 updates the value transfer card data to indicate that the physical value transfer card is cancelled and can no longer be used. As such, should someone try to use the physical value transfer card for a transaction, the transaction will be denied.
The server 110 provides, via the communications module and to the client device 100, a selectable option to add a digital value transfer card to a mobile wallet application on the client device 100 (step 530). In this embodiment, the selectable option is presented to the user through a GUI 700 shown in
The server 110 receives, via the communications module and from the client device 100, the indication of a selection of the selectable option to add the digital value transfer card to the mobile wallet application on the client device 100 (step 540). In this embodiment, once the user selects the selectable option 720 confirming that the user would like to add a digital value replacement card to their mobile wallet, an indication of the selection is communicated from the client device 100 to the server 110.
The server 110 provisions the mobile wallet application of the client device 100 with the digital value transfer card (step 550). In this embodiment, the server 110 generates a new digital value transfer card by generating new value transfer card data that includes the type of value transfer card (digital credit or digital debit) and the digital value transfer card number and associating the value transfer card data with the user. The digital value transfer card data is communicated, via the communications module, to the client device 100. Once the digital value transfer card data is received by the client device 100, the client device 100 may display a message 740 to the user indicating that the digital value transfer card has been added to the mobile wallet, as shown in
An exemplary digital value transfer card 750 is shown in
The server 110 sends, via the communications module and to the printer 130, instructions to generate a replacement physical value transfer card (step 560). In this embodiment, once the physical value transfer card has been cancelled, the server 110 sends instructions to generate a replacement physical value transfer card according to a method 800 shown in
The server 110 receives, via the communications module and from the client device 100, location data representing the location of the client device 100 (step 810). In this embodiment, the location data may be generated by the sensor module 230 of the client device 100.
The server 110 identifies the nearest branch to the client device 100 and identifies an electronic address associated with a printer located at that branch (step 820). In this embodiment, the server 110 accesses a database listing all available branches and determines the nearest branch to the location of the client device 100. The server 110 then accesses, from the database, the electronic address of a printer located at that branch.
The server 110 communicates, via the communications module and to the printer located at the nearest branch, an electronic message to generate the replacement physical value transfer card (step 830). In this embodiment, the electronic message includes value transfer card data including the value transfer card number and the user's name.
In response to receiving the electronic message, the printer 130 prints or embosses the replacement physical value transfer card. The replacement physical value transfer card number may be generated on a blank value transfer card made of metal or plastic. For example, the blank value transfer card may be made of metal and as such the printer 130 may be configured to print the replacement physical value transfer card number on a surface of the blank value transfer card. As another example, the blank value transfer card may be made of plastic and as such the printer may be configured to emboss the replacement physical value transfer card number on a surface of the blank value transfer card.
Once the printer 130 has completed generating the replacement physical value transfer card, the printer 130 communicates a message to the server 110 indicating that the replacement physical value transfer card is available for pick up. In response, the server 110 sends, via the communications module and to the client device 100, a notification indicating that the replacement value transfer card is available for pick up (step 840).
In this embodiment, as shown in
Although in embodiments, the indication that the physical value transfer card has been compromised is described as being received in response to the user reporting that the physical value transfer card is lost or stolen through a mobile application, those skilled in the art will appreciate that alternatives are available. For example, in another embodiment the server 110 may continuously monitor transactions made on the physical value transfer card to detect potential fraudulent activity. Signs of potential fraudulent activity may be an amount spent at a particular vendor or website, abnormal spending patterns, a distance between concurrent transactions, if the physical value transfer card was used at a location known to be high risk, etc.
An example is shown in
Another example is shown in
Another example is shown in
Although in embodiments described above the replacement physical value transfer card is described as being generated at the branch nearest to the location of the client device, those skilled in the art will appreciate that alternatives are available. For example, in another embodiment the replacement physical value transfer card may be generated at the branch nearest to the user's home or office. In another embodiment, the replacement physical value transfer card may be generated at a branch selected by the user. In another embodiment, the replacement physical value transfer card may be generated by a printer located outside of a branch. In another embodiment, the replacement physical value transfer card may be delivered to the user or dropped off at a particular location selected by the user.
As will be appreciated, at least some of the above embodiments and examples may be implemented within a mobile application installed on the client device. The mobile application may include other features some of which may be based on the geographical location of the client device.
The methods described above may be modified and/or operations of such methods combined to provide other methods.
Furthermore, the description above generally describes operations that may be performed by a server and a client device in cooperation with one another. Operations that are described as being performed by the server may, instead, be performed by the client device.
Example embodiments of the present application are not limited to any particular operating system, system architecture, mobile device architecture, server architecture, or computer programming language.
It will be understood that the applications, modules, routines, processes, threads, or other software components implementing the described method/process may be realized using standard computer programming techniques and languages. The present application is not limited to particular processors, computer languages, computer programming conventions, data structures, or other such implementation details. Those skilled in the art will recognize that the described processes may be implemented as a part of computer-executable code stored in volatile or non-volatile memory, as part of an application-specific integrated chip (ASIC), etc.
As noted, certain adaptations and modifications of the described embodiments can be made. Therefore, the above discussed embodiments are considered to be illustrative and not restrictive.